Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematical model
biblio
Magnetic performance measurement and mathematical model establishment of main core of magnetic modulator
Submitted by grigby1 on Wed, 05/16/2018 - 12:49pm
remanence
main core 1J85 permalloy
Mathematical model
MATLAB
maximum permeability
mean square error methods
multiple regression method
Permalloy
permeability curve
polynomial function
pubcrawl
regression analysis
magnetization curve
remanent magnetic induction intensity
resilience
Resiliency
RMSE
root mean squared error
saturation magnetic induction intensity
Saturation magnetization
Sensitivity
SSE
sum of squares due to error
ferromagnetic materials
arc-hyperbolic sine function
B-H curve mathematical model
ballistic method
coercive force
Compositionality
Curve fitting
curve fitting tool
DC current comparator
degree-of-freedom adjusted coefficient of determination
electromagnetic induction
excitation source
adjusted R-square
induced voltage
Magnetic cores
Magnetic field measurement
Magnetic flux
magnetic hysteresis
Magnetic modulators
magnetic performance
magnetic performance measurement
magnetic permeability
magnetisation
biblio
Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Submitted by K_Hooper on Wed, 05/09/2018 - 9:56am
outsourcing data services
security shortage
security problems
Security Audits
Security analysis
Secure storage
secure cloud storage
Scalability
Resiliency
Public key
public integrity auditing
public auditing scheme
public auditing
pubcrawl
Privacy-preserving
Cloud Computing
outsourcing
Mathematical model
low computational audit cost
integrity
Human behavior
Forgery
dynamic-hash-table based public auditing
dynamic hash table
dynamic data
data structure DHT
data blocks
Cryptography
cryptanalysis
countermeasures
biblio
Parameter tuning in modeling and simulations by using swarm intelligence optimization algorithms
Submitted by K_Hooper on Wed, 05/02/2018 - 9:37am
Biological system modeling
composability
Computational modeling
Firefly algorithms
Mathematical model
modeling and simulation
optimization
parameter tuning
particle swarm optimization
Predator prey systems
pubcrawl
Swarm Intelligence
Swarm Intelligence Optimization Algorithms
tuning
biblio
Rethinking the High Capacity 3D Steganography: Increasing Its Resistance to Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 10:33am
Mathematical model
Three-dimensional displays
stereo image processing
steganography detection
Steganography
steganalysis
shape distortion
Resistance
pubcrawl
privacy
Metrics
3D shape
Information hiding
Image edge detection
high capacity 3D steganographic method
Hamiltonian path quantization
Face
distortion
Data mining
composability
3D steganography
biblio
Trust-Based Protocol for Securing Routing in Opportunistic Networks
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
pubcrawl
trust-based routing protocol
Trust Routing
telecommunication security
telecommunication network topology
store-carry-forward mechanism
securing routing
Scalability
Routing protocols
Routing
Resiliency
resilience
Ad hoc networks
Packet loss
Opportunistic Networks
Mathematical model
malicious nodes
gray-hole attack
end-to-end connection
dynamic network topology
delivery success ratio
composability
black-hole attack
biblio
A General Framework of Hardware Trojan Detection: Two-Level Temperature Difference Based Thermal Map Analysis
Submitted by grigby1 on Wed, 04/11/2018 - 1:59pm
Temperature measurement
Mathematical model
normal circuits
operating chip
power proportion magnitude
pubcrawl
resilience
Resiliency
serious threats
Kalman filters
Thermal analysis
Thermal map analysis
thermal map analysis detection method
trojan horse detection
Trojan horses
two-level temperature difference
White noise
commercial chips
Kalman filter algorithm
Kalman filter
invasive software
Integrated circuit modeling
integrated circuit design
infrared imaging
hardware Trojan detection
Hardware
general framework
field programmable gate arrays
equivalent circuits
differential thermal maps
differential temperature
cyber physical systems
composability
biblio
Vulnerability prediction through self-learning model
Submitted by K_Hooper on Wed, 04/04/2018 - 8:58am
self-learning model
Vulnerability prediction
Vulnerability impact
vulnerability detection
Training
Software Vulnerability
software reliability
software fault tolerance
software fault
software development phase
software defect
Software algorithms
Software
Activation Function
Resiliency
pubcrawl
Predictive models
neural nets
Metrics
Mathematical model
learning (artificial intelligence)
Human behavior
Compositionality
Artificial Neural Networks
artificial neural network
biblio
Automated daily human activity recognition for video surveillance using neural network
Submitted by K_Hooper on Wed, 04/04/2018 - 8:56am
Activity Recognition
feature extraction
Human activities recognition
Human behavior
intelligent system
Legged locomotion
Mathematical model
Multi-layer feed forward perceptron
neural network
pubcrawl
Resiliency
Scalability
Training
video surveillance
biblio
Real-time localization of mobile targets using abnormal wireless signals
Submitted by K_Hooper on Wed, 04/04/2018 - 8:52am
pubcrawl
wireless sensor networks
Wireless communication
Underwater Networks
target tracking
signal processing
Scalability
Resiliency
real-time systems
real-time localization
abnormal wireless signals
multiwireless signals
mobile targets
Mobile communication
Metrics
Mathematical model
GPS signals
Global Positioning System
Communication system security
biblio
A secure localization algorithm based on reputation against wormhole attack in UWSNS
Submitted by K_Hooper on Wed, 04/04/2018 - 8:51am
secure localization algorithm
wormhole attack
wireless sensor networks
UWSNs-RDV-HOP
UWSNs
Underwater Wireless Sensor Networks
Underwater Networks
telecommunication security
Signal processing algorithms
signal processing
security
secure scheme
Acoustics
Scalability
Resiliency
reputation values
pubcrawl
propagation distance
Metrics
Mathematical model
marine communication
inconsistent propagation delays
DV-hop
anchor nodes
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
…
next ›
last »